Gen Zs, Alphas guilty of introducing cyber risks
With growing cybersecurity concerns top of mind for many organisations this year, recognising the varying approaches that different generations have to digital safety is an important component of effective security cultures. By Anna Collard, senior vice-president:...
Overcoming legacy systems for public security
When considering cybersecurity and data protection in the public sector, it is essential to acknowledge that the government faces critical challenges navigating the regulatory framework for data privacy and compliance. By Sarthak Rohal, senior vice-president at In2IT...
Is AI a game-changer for cyberthreats in Africa?
As the African continent continues its digital transformation, cybercriminals are becoming increasingly sophisticated, with AI emerging as a tool for more strategic and effective attacks - including distributed denial-of-service (DDoS) strikes. Bryan Hamman, regional...
The rise of autonomous data recovery
Escalating cyber threats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss. By Modeen Malick, principal systems engineer...
From romance hoaxes to the Illuminati: how ‘Nigerian’ email scams have evolved
In 2024, Kaspersky researchers detected over 414 000 ‘Nigerian’ email scams. These emails relied on messages that lured victims with enticing financial offers manipulating them into email exchanges which would ultimately be used to defraud them. The latest scams...
Integration is the key to smarter surveillance
Security threats are evolving and businesses in South Africa can no longer rely on standalone surveillance systems, writes Leandro da Cunha, surveillance business unit lead at Duxbury Networking. According to recent market projections, the local security industry is...

DLP helps to enhance and empower cybersecurity posture
DLP systems are preventing data leaks. It’s a rule of thumb. But DLP can do more than just that, writes Sergio Bertoni, leading analyst at SearchInform. DLP systems are the part of information security infrastructure. They monitor data in motion on endpoints and over...
As technology converges, so does cybercrime
The globe continues to become more and more connected, and just like legitimate organisations benefit from technological advances, this interconnectedness is allowing criminal and malicious networks to flourish too. By Anna Collard, senior vice-president: content...
Securing Africa’s manufacturing sector against cybercrime
Connectivity and automation have undeniably revolutionised the manufacturing sector, boosting efficiency and productivity. However, they have also introduced significant vulnerabilities, leaving the industry increasingly exposed to cybersecurity threats. By Andre...
From EPP to AI: the future of endpoint security for businesses
Endpoint security is a critical pillar of cybersecurity, especially for South African businesses, which are becoming prime targets for cybercriminals. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT Endpoint security involves safeguarding...
Avoid the trap of deepfake scams
In today’s digitally driven world, we are inundated with cyber scams, both direct and indirect, daily. As cybersecurity technology evolves to block traditional attacks, cybercriminals are increasingly turning to social engineering - manipulative psychological tactics...
The hidden dangers of increasingly advanced AI assistants
As the use of AI assistants in South Africa continues to grow, so do the risks. Zaheer Ebrahim, Trend Micro’s solutions architect for the Middle East and Africa, unpacks some of the emerging threats. The evolution of AI assistants over the past few years is nothing...